Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sheila E. Frankel is active.

Publication


Featured researches published by Sheila E. Frankel.


military communications conference | 2004

Optical control and management security standards for the GIG-BE

Renee Esposito; Sheila E. Frankel; Richard Graveman; Scott McNown

This paper presents an overview of requirements and standards development activities for securing the control and management infrastructure protocols for optical networking protocols used in the Global Information Grid-Bandwidth Expansion (GIG-BE). Our approaches to hardening these protocols are: (1) to develop open standards that encompass the Department of Defenses needs; and (2) to encourage vendors to supply products that support these standards and other appropriate security functionality for GIG-BE signaling, routing, discovery, and management. At MILCOM 2001, Buda et al. reported on commercial-off-the-shelf security standards being developed for the GIG; they covered asynchronous transfer mode, multi-protocol label switching, and newly emerging optical networking. We have now completed control plane security and management plane security implementation agreements at the Optical Internetworking Forum (OIF), coordinated and aligned these with ATIS-T1M1 and the IETF, and begun efforts to implement and demonstrate these agreements. This paper briefly describes the OIFs work on control plane functionality in optical networks and the security requirements for these control protocols. It then explains why additional security was required for signaling, routing, and discovery; shows what alternatives were considered; and describes the choices made in the OIFs Security Extension for UNI and NNI. Securing an optical switch depends on much more than secure control protocols, so the paper next covers the OIFs Security for Management Interfaces to Transport Network Elements, which describes security objectives and choices for securing operations, administration, maintenance, and provisioning (OAM and P) interfaces to these network elements. Specifications and recommendations are given along with a mapping of how following the specifications satisfies the initial objectives. The relationship of this work to the security standards developed by T1M1 is also described. Beyond these two implementation agreements, on-going efforts are focused on demonstrating the practicality of this approach, addressing end-to-end security, adding an audit log capability, continuing cooperation with T1M1 on OAM and P security, and keeping these implementation agreements aligned with new drafts and RFC on signaling, routing, discovery, and security at the IETF.


Archive | 2005

Guide to IPsec VPNs

Sheila E. Frankel; Karen Kent; Ryan Lewkowski; Angela Orebaugh; Ronald W. Ritchey; Steven Sharma


Special Publication (NIST SP) - 800-97 | 2007

Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i

Sheila E. Frankel; Bernard Eydt; L Owens; Karen Kent Scarfone


Special Publication (NIST SP) - 800-119 | 2010

Guidelines for the Secure Deployment of IPv6

Sheila E. Frankel; Richard Graveman; John Pearce; Mark Rooks


IEEE Security & Privacy | 2009

Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration

Alan Mink; Sheila E. Frankel; Ray A. Perlner


Archive | 2005

Guide to IPsec VPNs: Recommendations of the National Institute of Standards and Technology

Sheila E. Frankel; Karen Kent; Ryan Lewkowski; Angela Orebaugh; Ronald W. Ritchey; Steven Sharma


Special Publication (NIST SP) - 800-113 | 2008

Guide to SSL VPNs

Sheila E. Frankel; Paul Hoffman; Angela Orebaugh; Richard Park


Archive | 2005

SP 800-77. Guide to IPsec VPNs

Sheila E. Frankel; Karen Kent; Ryan Lewkowski; Angela Orebaugh; Ronald W. Ritchey; Steven Sharma


National Institute of Standards and Technology (U.S.) | 2010

Guidelines for the Secure Deployment of IPv6: Recommendations of the National Institute of Standards and Technology

Sheila E. Frankel; Richard Graveman; Mark Rooks


Archive | 2007

SP 800-97. Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i

Sheila E. Frankel; Bernard Eydt; Les Owens; Karen A. Scarfone

Collaboration


Dive into the Sheila E. Frankel's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Richard Graveman

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Alan Mink

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Karen A. Scarfone

National Institute of Standards and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge